A February 5, 2015 Report From the International Association of

Understanding the Federal
Government’s
“IT Insecurity” Crisis
A February 5, 2015 Report From the International Association of Information Technology Asset Managers
U.S. taxpayers have paid $59 billion for data protection since Fiscal Year 2010, including $10.3
billion in the most recent year under the Federal Information Security Management Act
(FISMA). This week, the Obama Administration proposed a $14 billion cybersecurity budget for
2016.
Graphic by: NextGov.
Nonetheless, Information Technology (IT) security and IT Asset Management (ITAM) woes in
federal agencies have been major staples of headlines in recent months, including problems
1|Page
and mishaps at the Internal Revenue Service, the White House, State Department, and the
Veteran’s Administration.
The number of reported cyber incidents affecting Federal Government agencies has increased
nearly a quarter in recent years, with agencies reporting more than 60,000 cyber incidents
reported to authorities in Fiscal Year 2013 alone.
If anything, the situation worsened in 2014 with several high profile cases coming to light:
1. DoD/ U.S. Central Command – social media hack
2.
3.
4.
5.
6.
United States Postal Service – China-linked attack on personnel info
White House – Russian hack on unclassified networks
DoD/ U.S. Transportation Command – Chinese hacker penetration
National Oceanic and Atmospheric Administration – Chinese hackers
Nuclear Regulatory Commission – IG Report- NRC hacked three times in
three years
7. U.S. Investigation Services (USIS) – Primary US security clearance
contractor
8. U.S. State Department – Hack on unclassified email network
But while awareness of the problem has spread, the ability to deal with such threats has
improved very little. Federal IT chiefs often cite inadequate funding as the biggest inhibitor to
progress, but a thorough investigation of the overall federal government IT sector reveals that
cost savings and IT security would be increased by a comprehensive ITAM program at the
national government level in the U.S.
2|Page
It is important to understand that in addition to breaches, there is a huge potential for cutting
wasteful spending through ITAM that would save taxpayers substantial sums of money. It has
been estimated that the Department of Homeland Security alone saved $181 million in
software licensing in one recent year, and that more than $1 billion could be saved in
information technology and telecommunications per year across the federal government if best
practices were applied.
The reality is that the crisis in federal IT management is as much an opportunity as it is a risk,
particularly when it comes to saving taxpayers money. The overall spending pattern of the
federal government on IT suggests that enormous progress could be achieved through better
and tighter ITAM practices. One major reason: Better control of inventory, software licensing,
upgrades, and so on, will actually reduce the risk of more federal government IT failures.
Conversely, spending greater and greater sums without proper ITAM controls in place is a
prescription for more breaches, risks posed by unauthorized devices, increases in lost and
stolen hard drives, and major vulnerabilities created by outdated and/or “unpatched” software.
The following chart shows two roughly comparable findings that private industry in the United
States pays an average of $4,600-$4,900 per employee on IT – less than $5,000 a head:
Annual IT Cost per Employee
Private Industry
High Cost
Low Cost
Average Cost per
Employee
IAITAM Study
$6,233.00
$3,500.00
$4,867.00
Gartner Study
$5867.00
$3413.00
$4,640.00
Contrast this average of less than $5,000 in private industry with the IT spending pattern of the
federal government:
3|Page
Sector/Agency
Budget
Federal Government
$73,700,000,000.00
# of Employees
2,050,000.00
Average Cost per
Employee
$36,162.00
This suggests that the federal government spends an astonishing six times more per
employee on IT than does private industry. As if these overall figures were not eye-popping
enough, the variations by federal agency are even more extreme, including more than
$168,000 per U.S. Department of Education employee and more than $109,000 per U.S. State
Department employee! It is not comforting to see that the most reasonable (in relative terms)
level of spending is at the technology-challenged Veteran’s Administration at nearly $11,700
per employee, a level still well over twice what private industry pays in the U.S.
4|Page
If this level of federal spending on IT was to be reduced to just three times the average for
private industry, the savings would add up to well over $30 billion, of which only a tiny fraction
would be needed to put in place needed ITAM controls on overall federal IT and IT Security.
What drives the enormous bloat and inefficiencies at the federal level?
IAITAM’s review of federal agencies found that while the hacks and breaches get all the
attention, the waste of taxpayer dollars is every bit as troubling. Consider these findings:
DEPARTMENT OF ENERGY
THEME: Waste


DOE is not managing its hardware acquisitions. An Inspector General (IG) investigation
found that in 2012 DOE spent nearly $2 million more than necessary on IT equipment
acquisitions at just eight sites investigated. The IG investigation found that IT acquisition
standards that were in place were disregarded 75% of the time at these sites. At one of the
eight sites monitored, standards were not followed 100% of the time. This contributed to
huge and wasteful variations in the price paid per device across the sites. The IG found that
at one site the DOE paid 42 different prices ranging from approximately $900 to over $2,000
for one desktop model in FY 2012. In total, those price fluctuations alone could have cost
the DOE more than a quarter of a million dollars across the sites reviewed.
September 2014 IG Audit found that over a three-year period, DOE paid approximately
$600,000 more than necessary on software licenses. The IG audit found at least 52
instances where price paid for common products varied widely – up to 46%, and $2,700 per
license.
SECURITIES AND EXCHANGE COMMISSION
THEME: Mismanagement
From an October 2014 IG Audit: 17% of the laptops reviewed had incorrect location; 22% had
incorrect user information; and 5% – 24 of 488 laptops – were totally unaccounted for. Based
on this sample, the IG concluded that more than 200 SEC laptops were missing on an agencywide basis.
INTERNAL REVENUE SERVICE
THEMES: Waste and Mismanagement
5|Page
A February 2014 IG Report found inadequate software management cost taxpayers $11.6
million in unused software in a single contract.
An April 2014 Government Accountability Office (GAO) report found “significant deficiency” in
IRS information security. The IRS had not installed appropriate patches on all databases and
servers to protect against known vulnerabilities. The IRS had not sufficiently monitored
database and mainframe controls. The IRS had not appropriately restricted access to its
mainframe environment.
A November 2014 IG Report found that mobile device management is poor at the IRS. Nearly
three out of five (57%) of mobile device inventory records were incorrect at an agency where
94% of employees are provided with a mobile device.
6|Page
The IG report found that lost and stolen wireless devices were not documented, at a whopping
rate of 30% of the sample. Further, the IRS paid monthly service fees for almost 6,800 devices
that were not inventoried (almost 17% of total devices, and almost $2 million per year in
service fees). For more than 700 employees, the IRS paid for multiple mobile devices (between
two and five) despite the prohibition against multiple devices.
U.S. DEPARTMENT OF VETERANS AFFAIRS
THEME: Recurring Unfixed Issues
In November 2014, the VA failed its annual cybersecurity audit for its 16th consecutive year. In
testimony, Sondra McCauley, Deputy Assistant Inspector General for Audits and Evaluations,
Office of Inspector General, U.S. Department of Veterans Affairs cited recurring issues in audit
after audit. Highlights from her 2014 testimony included the following:








IT systems were not patched or securely configured to mitigate in a timely way known and
unknown information security vulnerabilities.
VA databases included “several known critical vulnerabilities that cannot be updated with
patches.” Performance and security weaknesses were inherent with older versions of the
system software in use.
Several VA organizations were sharing the same local networks as other tenants of VA
facilities and data centers. These networks were not under VA control, and often had
“critical or high-level vulnerabilities” that weakened the overall security posture of the VA.
Password standards, and multi-factor authentication for remote access, were not
consistently implemented and enforced.
Monitoring of access was lacking in the production environment for individuals with
elevated application privileges for a major application.
Unknown and unmonitored system interconnections continued to exist.
VA did not effectively manage and monitor its systems hosted at a cloud service provider.
Backup tapes were not encrypted prior to being sent to offsite storage at selected facilities
and data centers.
Even after a dramatic cyber hack was detected in 2012, a GAO report from November 2014
found that the “VA has not addressed an underlying vulnerability that allowed the incident to
occur.”
DEPARTMENT OF EDUCATION
THEME: Recurring Unfixed Issues
7|Page
A November 2014 IG Report found that “longstanding weaknesses” continue to cause the
Department’s information systems to be vulnerable to “serious security threats.” The problems
“comprised repeat or modified repeat findings from OIG reports issued in 2011 and 2013.”
The repeat offenses included:



The Department of Education was not tracking the IT assets in their inventory. The Agency
“had not fully established policies and procedures to identify all devices that were attached
to the network, distinguish those devices from users, and authenticate devices that were
connected to the network.”
Repeated breakdowns in communication were noted when security incidents occurred.
Almost 10% of sampled incidents were not reported to the United States Computer
Emergency Readiness Team as required. Of those, many were deemed problematic enough
to require reporting to law enforcement. Yet 94% were not communicated to appropriate
law enforcement.
System authorization and documentation: 24% of IT systems in the Department’s network
were operating on expired security authorizations.
U.S. DEPARTMENT OF AGRICULTURE
THEME: Recurring Unfixed Issues
A November 2014 IG Report found many longstanding weaknesses:
 Between fiscal year 2011 and 2013, IG made 55 recommendations for improving overall IT
security. Less than half (21) had been addressed with corrective action at the time of the
November 2014 report.
 Slow remediation: 37% of vulnerabilities found at one USDA agency were not remedied
within six months.
 Software Management: USDA did not have a process for timely and secure installation of
software patches, despite requirement. The IG report found that an astounding 82.5% of
correctable vulnerabilities at one USDA agency were not patched when one was available.
 Documentation of incidents: When IT incidents occurred, 18% were not handled in
accordance with procedures on analysis, validation, and documentation.
 Poor contractor/inventory management: IG report found 23 contractor systems were not
being recorded in the Cyber Security Assessment and Management system.
DEPARTMENT OF HOMELAND SECURITY
THEME: Mismanagement
A December 2014 IG Report Found:
8|Page



FEMA and United States Citizenship and Immigration Service (USCIS) were still using the
Microsoft Windows XP operating system, which remains vulnerable to attack as Microsoft
stopped providing software updates to mitigate security vulnerabilities in April 2014.
USCIS has a track record of not mitigating high-risk vulnerabilities in a timely manner. For
example, the Heartbleed alert was issued to USCIS on June 27, 2014 with a mandate to get
systems inoculated against it by July 7. When audited several weeks after that deadline, the
IG found that USCIS workstations were still vulnerable to Heartbleed.
IT system inventory is not supposed to fluctuate largely from month to month. If it does, it
indicates a problem, such as improper capturing methodology. This remained a persistent
issue at some DHS agencies.
NUCLEAR REGULATORY COMMISSION
THEME: Recurring Unfixed Issues
November 2014 IG Report: IT security program weakness.



Continuous IT monitoring was not performed as required.
Repeat finding: configuration management procedures are still not consistently
implemented.
Repeat finding: plan of action and milestone (POA&M) management needs improvement.
CONCLUSION/RECOMMENDATIONS
At the root of much of what ails the federal government bloat in IT spending and related woes
is a lack of meaningful IT Asset Management. ITAM is the bridge that links an organization’s
financial, contractual, and physical IT inventory requirements with the goals and objectives of
the operational IT environment.
The Federal Government’s approach to ITAM should include two components:

The first is a rigorous government-wide centralized ITAM program responsible for creating
policies, procedures, processes, and metrics for all government agencies.

The second is an agency-level ITAM team, which would include the day-to-day management
of all assets within that agency as set forth and required by the centralized program.
Concurrently, legislation should be enacted to protect and manage our greatest resource
(technology) at the federal level, state level, and in critical infrastructure in the private sector.
This legislation should address the areas of procurement, disposal, inventory management to
9|Page
the component level of IT Assets (such as hard drives), data security, and other mandated
policies which would mitigate the risk to the United States and the critical infrastructure that is
not owned by the government but is enabled and regulated by legislation.
A focus on ITAM at the federal level will decrease:
 IT security threats by understanding what you have, how it is being used, where it is
located, who is using it, and when it is being used.
 Unnecessary IT spending by eliminating unused or underused products, maintenance,
storage, and potentially hundreds of other areas from procurement to disposal.
 Gross underutilization of existing IT assets by understanding what we actually have and
what is actually needed.
 Software license compliance violations by not only ensuring proper licensing but also
eliminating rogue purchases.
 Equipment missing and/or lost -- by having the knowledge of what you own you will be able
to identify the danger in a speedy and efficient manner should the situation arise of a
missing or lost piece of technology.
 Unauthorized user access by ensuring the standards are in place and backed by policy on
who and when access is needed.
 Data lost by tracking the components of assets containing information.
 Unauthorized software programs installed and purchased outside of normal procurement
process by ensuring a policy and standard is in place to eliminate rogue acquisition and
installations.
 Project mismanagement by establishing a set of standards by which all projects must follow.
 Contract inconsistencies by establishing a set of standards by which all contracts and
negotiations must follow.
A focus on ITAM at the federal level will increase:
 Infrastructure security by providing the knowledge and understanding of what you have,
how it is being used, where it is located, who is using it, and when it is being used within
your environment.
 IT accountability by providing measurements to understand what is owned and how it is
used.
 IT asset value by ensuring assets are used to their full potential and overspending is
mitigated.
 IT compliance by ensuring the procedures are in place to adhere to legislation and
requirements.
 Usable, reliable, real-time information for proactive IT business decision-making by enacting
a reporting structure that monitors performance of assets.
 Effectiveness in process adoption and automated management by defining procedures and
processes that are repeatable and measurable.
 ITAM awareness and ownership by establishing a communication and education key
process area which promotes ITAM awareness.
10 | P a g e


Visibility of the IT asset environment to support IT Service Management through the
association between the service and the asset.
Software patch management accuracy by providing the knowledge and understanding of
what you have and where it lies in the lifecycle process.
ABOUT IAITAM
The International Association of Information Technology Asset Managers, Inc. is the
professional association for individuals and organizations involved in any aspect of IT Asset
Management, Software Asset Management (SAM), Hardware Asset Management, Mobile Asset
Management, IT Asset Disposition and the lifecycle processes supporting IT Asset Management
in organizations and industry across the globe. IAITAM certifications are the only IT Asset
Management certifications that are accredited and unconditionally recognized worldwide. For
more information, visit www.iaitam.org, or the IAITAM mobile app on Google Play or the iTunes
App Store.
11 | P a g e